Search results for: information theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14813

Search results for: information theory

12293 The Logistics Equation and Fractal Dimension in Escalators Operations

Authors: Ali Albadri

Abstract:

The logistics equation has never been used or studied in scientific fields outside the field of ecology. It has never been used to understand the behavior of a dynamic system of mechanical machines, like an escalator. We have studied the compatibility of the logistic map against real measurements from an escalator. This study has proven that there is good compatibility between the logistics equation and the experimental measurements. It has discovered the potential of a relationship between the fractal dimension and the non-linearity parameter, R, in the logistics equation. The fractal dimension increases as the R parameter (non-linear parameter) increases. It implies that the fractal dimension increases as the phase of the life span of the machine move from the steady/stable phase to the periodic double phase to a chaotic phase. The fractal dimension and the parameter R can be used as a tool to verify and check the health of machines. We have come up with a theory that there are three areas of behaviors, which they can be classified during the life span of a machine, a steady/stable stage, a periodic double stage, and a chaotic stage. The level of attention to the machine differs depending on the stage that the machine is in. The rate of faults in a machine increases as the machine moves through these three stages. During the double period and the chaotic stages, the number of faults starts to increase and become less predictable. The rate of predictability improves as our monitoring of the changes in the fractal dimension and the parameter R improves. The principles and foundations of our theory in this work have and will have a profound impact on the design of systems, on the way of operation of systems, and on the maintenance schedules of the systems. The systems can be mechanical, electrical, or electronic. The discussed methodology in this paper will give businesses the chance to be more careful at the design stage and planning for maintenance to control costs. The findings in this paper can be implied and used to correlate the three stages of a mechanical system to more in-depth mechanical parameters like wear and fatigue life.

Keywords: logistcs map, bifurcation map, fractal dimension, logistics equation

Procedia PDF Downloads 108
12292 The Effect of Brand Recovery Communications on Embarrassed Consumers’ Cognitive Appraisal and Post-purchase Behavior

Authors: Kin Yan Ho

Abstract:

Negative brand news (such as Volkswagen’s faulty carbon emission reports, China’s Luckin Coffee scandal, and bribery in reputable US universities) influence how people perceive a company. Germany’s citizens claimed Volkswagen’s scandal as a national embarrassment and cannot recover their psychological damages through monetary and non-monetary compensation. The main research question is to examine how consumers evaluate and respond to embarrassing brand publicity. The cognitive appraisal theory is used as a theoretical foundation. This study describes the use of scenario-based experiment. The findings suggest that consumers with different levels of embarrassment evaluate brand remedial offers from emotion-focused and task-focused restorative justice perspectives (newly derived from the well-established scales of perceived justice). When consumers face both negative and positive brand information (i.e., negative publicity news and a remedial offer), they change their appraisal criterion. The social situation in the cognitive reappraisal process influences the quality of the customer-brand relationship and the customer’s recovery from brand embarrassment. The results also depict that the components of recovery compensation cause differences in emotion recovery, relationship quality, and repurchase intentions. This study extends embarrassment literature in an embarrassing brand publicity context. The emotional components of brand remedial tactics provide insights to brand managers on how to handle different consumers’ emotions, consumer satisfaction, and foster positive future behavior.

Keywords: brand relationship quality, cognitive appraisal, crisis communications, emotion, justice, social presence

Procedia PDF Downloads 134
12291 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 306
12290 The Impact of Effective Employee Retention Strategies to the Success of the Hotel Industry of Rwanda

Authors: Ange Meghane Hakizimana, Landry Ndikuriyo

Abstract:

Retention of employees in the hospitality industry is a recurrent agenda in the organization involving all the combined efforts to maintain the best available laborer. The general objective of this research is to assess the impact of effective employee retention strategies on the success of the hotel industry at Galileo Hotel, Huye District in Rwanda, for the period of 2019-2021. Herzberg Two Factor Theory and Equity Theory were used. The study adopted a descriptive research design. Descriptive research design allowed us to study the elements in their natural form without making any alterations to them. Secondary data and primary data and the data collected were sorted and entered into the statistical packages for social sciences for analysis (SPSS) version 26. Frequencies, descriptive statistics and percentages were used to analyze and establish extent to which employee retention strategies impact the success of the hotel industry of Rwanda and this was analyzed using regression and correlation analysis. The results revealed that employee training and development had an influence of 24.8% on the success of the hotel industry in Rwanda. According to the results of our study, the employee reward system contributes 20.7% to the success of the hotel industry in Rwanda, the value of t is 3.475 and this is greater than the standard t value score of 1.96, p-value is 0.002. Therefore the employee reward system has a great positive impact on the success of the hotel industry in Rwanda. The results also show that 15.7% of the success of the hospitality industry in Rwanda is due to the work environment of employees. With a t-value of 4.384 and a p-value of 0.000, the above statistics show a positive impact of the employees' working environment on success of the hospitality industry in Rwanda. A priority to the retention of their employees should be given by the hotel industry and its managers because it has already been proven that it is an effective approach to offering good customer service. In addition, employee retention reduces expenses associated with employee recruitment and turnover.

Keywords: success, hotel industry, training and development, employee reward system, employee work environment

Procedia PDF Downloads 97
12289 The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure

Authors: Jiri Barta, Jiří F. Urbanek

Abstract:

This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements.

Keywords: interoperability, communication systems, controlling proces, critical infrastructure, crisis workplaces, continuity

Procedia PDF Downloads 299
12288 A Comparative Study of the Athlete Health Records' Minimum Data Set in Selected Countries and Presenting a Model for Iran

Authors: Robab Abdolkhani, Farzin Halabchi, Reza Safdari, Goli Arji

Abstract:

Background and purpose: The quality of health record depends on the quality of its content and proper documentation. Minimum data set makes a standard method for collecting key data elements that make them easy to understand and enable comparison. The aim of this study was to determine the minimum data set for Iranian athletes’ health records. Methods: This study is an applied research of a descriptive comparative type which was carried out in 2013. By using internal and external forms of documentation, a checklist was created that included data elements of athletes health record and was subjected to debate in Delphi method by experts in the field of sports medicine and health information management. Results: From 97 elements which were subjected to discussion, 85 elements by more than 75 percent of the participants (as the main elements) and 12 elements by 50 to 75 percent of the participants (as the proposed elements) were agreed upon. In about 97 elements of the case, there was no significant difference between responses of alumni groups of sport pathology and sports medicine specialists with medical record, medical informatics and information management professionals. Conclusion: Minimum data set of Iranian athletes’ health record with four information categories including demographic information, health history, assessment and treatment plan was presented. The proposed model is available for manual and electronic medical records.

Keywords: Documentation, Health record, Minimum data set, Sports medicine

Procedia PDF Downloads 480
12287 Transparency Obligations under the AI Act Proposal: A Critical Legal Analysis

Authors: Michael Lognoul

Abstract:

In April 2021, the European Commission released its AI Act Proposal, which is the first policy proposal at the European Union level to target AI systems comprehensively, in a horizontal manner. This Proposal notably aims to achieve an ecosystem of trust in the European Union, based on the respect of fundamental rights, regarding AI. Among many other requirements, the AI Act Proposal aims to impose several generic transparency obligationson all AI systems to the benefit of natural persons facing those systems (e.g. information on the AI nature of systems, in case of an interaction with a human). The Proposal also provides for more stringent transparency obligations, specific to AI systems that qualify as high-risk, to the benefit of their users, notably on the characteristics, capabilities, and limitations of the AI systems they use. Against that background, this research firstly presents all such transparency requirements in turn, as well as related obligations, such asthe proposed obligations on record keeping. Secondly, it focuses on a legal analysis of their scope of application, of the content of the obligations, and on their practical implications. On the scope of transparency obligations tailored for high-risk AI systems, the research notably notes that it seems relatively narrow, given the proposed legal definition of the notion of users of AI systems. Hence, where end-users do not qualify as users, they may only receive very limited information. This element might potentially raise concern regarding the objective of the Proposal. On the content of the transparency obligations, the research highlights that the information that should benefit users of high-risk AI systems is both very broad and specific, from a technical perspective. Therefore, the information required under those obligations seems to create, prima facie, an adequate framework to ensure trust for users of high-risk AI systems. However, on the practical implications of these transparency obligations, the research notes that concern arises due to potential illiteracy of high-risk AI systems users. They might not benefit from sufficient technical expertise to fully understand the information provided to them, despite the wording of the Proposal, which requires that information should be comprehensible to its recipients (i.e. users).On this matter, the research points that there could be, more broadly, an important divergence between the level of detail of the information required by the Proposal and the level of expertise of users of high-risk AI systems. As a conclusion, the research provides policy recommendations to tackle (part of) the issues highlighted. It notably recommends to broaden the scope of transparency requirements for high-risk AI systems to encompass end-users. It also suggests that principles of explanation, as they were put forward in the Guidelines for Trustworthy AI of the High Level Expert Group, should be included in the Proposal in addition to transparency obligations.

Keywords: aI act proposal, explainability of aI, high-risk aI systems, transparency requirements

Procedia PDF Downloads 319
12286 The Potentials of Online Learning and the Challenges towards Its Adoption in Nigeria's Higher Institutions of Learning

Authors: Kuliya Muhammed

Abstract:

This paper examines the potentials of online learning and the challenges to its adoption in Nigeria’s higher institutions of learning. The research would assist in tackling the challenges of online learning adoption and enlighten institutions on the numerous benefits of online learning in Nigeria. The researcher used survey method for the study and questionnaires were used to obtain the needed data from 230 respondents cut across 20 higher institutions in the country. The findings revealed that online learning has the prospect to boost access to learning tools, assist students’ to learn from the comfort of their offices or homes, reduce the cost of learning, and enable individuals to gain self-knowledge. The major challenges in the adoption of e-learning are poor Information and Communication Technology infrastructures, poor internet connectivity where available, lack of Information and Communication Technology background, problem of power supply, lack of commitment by institutions, poor maintenance of Information and Communication Technology tools, inadequate facilities, lack of government funding and fraud. Recommendations were also made at the end of the research work.

Keywords: electronic, ICT, institution, internet, learning, technology

Procedia PDF Downloads 388
12285 Spectral Properties of Fiber Bragg Gratings

Authors: Y. Hamaizi, H. Triki, A. El-Akrmi

Abstract:

In this paper, the reflection spectra, group delay and dispersion of a uniform fiber Bragg grating (FBG) are obtained. FBGs with two types of apodized variations of the refractive index were modeled to show how the side-lobes can be suppressed. Apodization techniques are used to get optimized reflection spectra. The simulation is based on solving coupled mode equations together with the transfer matrix method.

Keywords: fiber bragg gratings, coupled-mode theory, reflectivity, apodization

Procedia PDF Downloads 704
12284 Rumour Containment Using Monitor Placement and Truth Propagation

Authors: Amrah Maryam

Abstract:

The emergence of online social networks (OSNs) has transformed the way we pursue and share information. On the one hand, OSNs provide great ease for the spreading of positive information while, on the other hand, they may also become a channel for the spreading of malicious rumors and misinformation throughout the social network. Thus, to assure the trustworthiness of OSNs to its users, it is of vital importance to detect the misinformation propagation in the network by placing network monitors. In this paper, we aim to place monitors near the suspected nodes with the intent to limit the diffusion of misinformation in the social network, and then we also detect the most significant nodes in the network for propagating true information in order to minimize the effect of already diffused misinformation. Thus, we initiate two heuristic monitor placement using articulation points and truth propagation using eigenvector centrality. Furthermore, to provide real-time workings of the system, we integrate both the monitor placement and truth propagation entities as well. To signify the effectiveness of the approaches, we have carried out the experiment and evaluation of Stanford datasets of online social networks.

Keywords: online social networks, monitor placement, independent cascade model, spread of misinformation

Procedia PDF Downloads 161
12283 Auditing of Building Information Modeling Application in Decoration Engineering Projects in China

Authors: Lan Luo

Abstract:

In China’s construction industry, it is a normal practice to separately subcontract the decoration engineering part from construction engineering, and Building Information Modeling (BIM) is also done separately. Application of BIM in decoration engineering should be integrated with other disciplines, but Chinese current practice makes this very difficult and complicated. Currently, there are three barriers in the auditing of BIM application in decoration engineering in China: heavy workload; scarcity of qualified professionals; and lack of literature concerning audit contents, standards, and methods. Therefore, it is significant to perform research on what (contents) should be evaluated, in which phase, and by whom (professional qualifications) in BIM application in decoration construction so that the application of BIM can be promoted in a better manner. Based on this consideration, four principles of BIM auditing are proposed: Comprehensiveness of information, accuracy of data, aesthetic attractiveness of appearance, and scheme optimization. In the model audit, three methods should be used: Collision, observation, and contrast. In addition, BIM auditing at six stages is discussed and a checklist for work items and results to be submitted is proposed. This checklist can be used for reference by decoration project participants.

Keywords: audit, evaluation, dimensions, methods, standards, BIM application in decoration engineering projects

Procedia PDF Downloads 343
12282 Microfinance and Microenterprise Development: Evidence from Bangladesh

Authors: Rahat Dewan

Abstract:

The debate surrounding the efficacy of microfinance and the importance of microenterprise is fierce, lengthy and multifaceted. This paper reviews key issues, theory and evidence surrounding microfinance and microenterprise development for poverty alleviation. We report on a recently completed, large-scale microenterprise development intervention in Bangladesh using the rudimentary data available to us, and also our own qualitative field research. We find reasonable evidence for significant returns to several development outcomes.

Keywords: Bangladesh, development, microenterprise, microfinance

Procedia PDF Downloads 234
12281 Data Collection in Protected Agriculture for Subsequent Big Data Analysis: Methodological Evaluation in Venezuela

Authors: Maria Antonieta Erna Castillo Holly

Abstract:

During the last decade, data analysis, strategic decision making, and the use of artificial intelligence (AI) tools in Latin American agriculture have been a challenge. In some countries, the availability, quality, and reliability of historical data, in addition to the current data recording methodology in the field, makes it difficult to use information systems, complete data analysis, and their support for making the right strategic decisions. This is something essential in Agriculture 4.0. where the increase in the global demand for fresh agricultural products of tropical origin, during all the seasons of the year requires a change in the production model and greater agility in the responses to the consumer market demands of quality, quantity, traceability, and sustainability –that means extensive data-. Having quality information available and updated in real-time on what, how much, how, when, where, at what cost, and the compliance with production quality standards represents the greatest challenge for sustainable and profitable agriculture in the region. The objective of this work is to present a methodological proposal for the collection of georeferenced data from the protected agriculture sector, specifically in production units (UP) with tall structures (Greenhouses), initially for Venezuela, taking the state of Mérida as the geographical framework, and horticultural products as target crops. The document presents some background information and explains the methodology and tools used in the 3 phases of the work: diagnosis, data collection, and analysis. As a result, an evaluation of the process is carried out, relevant data and dashboards are displayed, and the first satellite maps integrated with layers of information in a geographic information system are presented. Finally, some improvement proposals and tentatively recommended applications are added to the process, understanding that their objective is to provide better qualified and traceable georeferenced data for subsequent analysis of the information and more agile and accurate strategic decision making. One of the main points of this study is the lack of quality data treatment in the Latin America area and especially in the Caribbean basin, being one of the most important points how to manage the lack of complete official data. The methodology has been tested with horticultural products, but it can be extended to other tropical crops.

Keywords: greenhouses, protected agriculture, data analysis, geographic information systems, Venezuela

Procedia PDF Downloads 131
12280 Evaluation Means in English and Russian Academic Discourse: Through Comparative Analysis towards Translation

Authors: Albina Vodyanitskaya

Abstract:

Given the culture- and language-specific nature of evaluation, this phenomenon is widely studied around the linguistic world and may be regarded as a challenge for translators. Evaluation penetrates all the levels of a scientific text, influences its composition and the reader’s attitude towards the information presented. One of the most challenging and rarely studied phenomena is the individual style of the scientific writer, which is mostly reflected in the use of evaluative language means. The evaluative and expressive potential of a scientific text is becoming more and more welcoming area for researchers, which stems in the shift towards anthropocentric paradigm in linguistics. Other reasons include: the cognitive and psycholinguistic processes that accompany knowledge acquisition, a genre-determined nature of a scientific text, the increasing public concern about the quality of scientific papers and some such. One more important issue, is the fact that linguists all over the world still argue about the definition of evaluation and its functions in the text. The author analyzes various approaches towards the study of evaluation and scientific texts. A comparative analysis of English and Russian dissertations and other scientific papers with regard to evaluative language means reveals major differences and similarities between English and Russian scientific style. Though standardized and genre-specific, English scientific texts contain more figurative and expressive evaluative means than the Russian ones, which should be taken into account while translating scientific papers. The processes that evaluation undergoes while being expressed by means of a target language are also analyzed. The author offers a target-language-dependent strategy for the translation of evaluation in English and Russian scientific texts. The findings may contribute to the theory and practice of translation and can increase scientific writers’ awareness of inter-language and intercultural differences in evaluative language means.

Keywords: academic discourse, evaluation, scientific text, scientific writing, translation

Procedia PDF Downloads 354
12279 Mental Accounting Theory Development Review and Application

Authors: Kang-Hsien Li

Abstract:

Along with global industries in using technology to enhance the application, make the study drawn more close to the people’s behavior and produce data analysis, extended out from the mental accounting of prospect theory, this paper provides the marketing and financial applications in the field of exploration and discussions with the future. For the foreseeable future, the payment behavior depends on the form of currency, which affects a variety of product types on the marketing of marketing strategy to provide diverse payment methods to enhance the overall sales performance. This not only affects people's consumption also affects people's investments. Credit card, PayPal, Apple pay, Bitcoin and any other with advances in technology and other emerging payment instruments, began to affect people for the value and the concept of money. Such as the planning of national social welfare policies, monetary and financial regulators and regulators. The expansion can be expected to discuss marketing and finance-related mental problems at the same time, recent studies reflect two different ideas, the first idea is that individuals affected by situational frames, not broad impact at the event level, affected by the people basically mental, second idea is that when an individual event affects a broader range, and majority of people will choose the same at the time that the rational choice. That are applied to practical application of marketing, at the same time provide an explanation in the financial market under the anomalies, due to the financial markets has varied investment products and different market participants, that also highlights these two points. It would provide in-depth description of humanity's mental. Certainly, about discuss mental accounting aspects, while artificial intelligence application development, although people would be able to reduce prejudice decisions, that will also lead to more discussion on the economic and marketing strategy.

Keywords: mental accounting, behavior economics, consumer behaviors, decision-making

Procedia PDF Downloads 451
12278 Building a Composite Approach to Employees' Motivational Needs by Combining Cognitive Needs

Authors: Alexis Akinyemi, Laurene Houtin

Abstract:

Measures of employee motivation at work are often based on the theory of self-determined motivation, which implies that human resources departments and managers seek to motivate employees in the most self-determined way possible and use strategies to achieve this goal. In practice, they often tend to assess employee motivation and then adapt management to the most important source of motivation for their employees, for example by financially rewarding an employee who is extrinsically motivated, and by rewarding an intrinsically motivated employee with congratulations and recognition. Thus, the use of motivation measures contradicts theoretical positioning: theory does not provide for the promotion of extrinsically motivated behaviour. In addition, a corpus of social psychology linked to fundamental needs makes it possible to personally address a person’s different sources of motivation (need for cognition, need for uniqueness, need for effects and need for closure). By developing a composite measure of motivation based on these needs, we provide human resources professionals, and in particular occupational psychologists, with a tool that complements the assessment of self-determined motivation, making it possible to precisely address the objective of adapting work not to the self-determination of behaviours, but to the motivational traits of employees. To develop such a model, we gathered the French versions of the cognitive needs scales (need for cognition, need for uniqueness, need for effects, need for closure) and conducted a study with 645 employees of several French companies. On the basis of the data collected, we conducted a confirmatory factor analysis to validate the model, studied the correlations between the various needs, and highlighted the different reference groups that could be used to use these needs as a basis for interviews with employees (career, recruitment, etc.). The results showed a coherent model and the expected links between the different needs. Taken together, these results make it possible to propose a valid and theoretically adjusted tool to managers who wish to adapt their management to their employees’ current motivations, whether or not these motivations are self-determined.

Keywords: motivation, personality, work commitment, cognitive needs

Procedia PDF Downloads 123
12277 Predicting Intention and Readiness to Alcohol Consumption Reduction and Cessation among Thai Teenagers Using Scales Based on the Theory of Planned Behavior

Authors: Rewadee Watakakosol, Arunya Tuicomepee, Panrapee Suttiwan, Sakkaphat T. Ngamake

Abstract:

Health problems caused by alcohol consumption not only have short-term effects at the time of drinking but also leave long-lasting health conditions. Teenagers who start drinking in their middle-high or high school years or before entering college have higher likelihood to increase their alcohol use and abuse, and they were found to be less healthy compared with their non-drinking peers when entering adulthood. This study aimed to examine factors that predict intention and readiness to reduce and quit alcohol consumption among Thai teenagers. Participants were 826 high-school and vocational school students, most of whom were females (64.4%) with the average age of 16.4 (SD = 0.9) and the average age of first drinking at 13.7 (SD = 2.2). Instruments included the scales that developed based on the Theory of Planned Behaviour theoretical framework. They were the Attitude toward Alcohol Reduction and Cessation Scale, Normative Group and Influence Scale, Perceived Behavioral Control toward Alcohol Reduction and Cessation Scale, Behavioral Intent toward Alcohol Reduction and Cessation Scale, and Readiness to Reduce and Quit Alcohol Consumption Scale. Findings revealed that readiness to reduce / quit alcohol was the most powerful predictive factor (β=. 53, p < .01), followed by attitude of easiness in alcohol reduction and cessation (β=.46, p < .01), perceived behavioral control toward alcohol reduction and cessation (β =.41, p < .01), normative group and influence (β=.15, p < .01), and attitude of being accepted from alcohol reduction and cessation (β = -.12, p < .01), respectively. Attitude of improved health after alcohol reduction and cessation did not show statistically significantly predictive power. All factors significantly predict teenagers’ alcohol reduction and cessation behavior and accounted for 59 percent of total variance of alcohol consumption reduction and cessation.

Keywords: alcohol consumption reduction and cessation, intention, readiness to change, Thai teenagers

Procedia PDF Downloads 335
12276 Moving beyond the Social Model of Disability by Engaging in Anti-Oppressive Social Work Practice

Authors: Irene Carter, Roy Hanes, Judy MacDonald

Abstract:

Considering that disability is universal and people with disabilities are part of all societies; that there is a connection between the disabled individual and the societal; and that it is society and social arrangements that disable people with impairments, contemporary disability discourse emphasizes the social model of disability to counter medical and rehabilitative models of disability. However, the social model does not go far enough in addressing the issues of oppression and inclusion. The authors indicate that the social model does not specifically or adequately denote the oppression of persons with disabilities, which is a central component of progressive social work practice with people with disabilities. The social model of disability does not go far enough in deconstructing disability and offering social workers, as well as people with disabilities a way of moving forward in terms of practice anchored in individual, familial and societal change. The social model of disability is expanded by incorporating principles of anti-oppression social work practice. Although the contextual analysis of the social model of disability is an important component there remains a need for social workers to provide service to individuals and their families, which will be illustrated through anti-oppressive practice (AOP). By applying an anti-oppressive model of practice to the above definitions, the authors not only deconstruct disability paradigms but illustrate how AOP offers a framework for social workers to engage with people with disabilities at the individual, familial and community levels of practice, promoting an emancipatory focus in working with people with disabilities. An anti- social- oppression social work model of disability connects the day-to-day hardships of people with disabilities to the direct consequence of oppression in the form of ableism. AOP theory finds many of its basic concepts within social-oppression theory and the social model of disability. It is often the case that practitioners, including social workers and psychologists, define people with disabilities’ as having or being a problem with the focus placed upon adjustment and coping. A case example will be used to illustrate how an AOP paradigm offers social work a more comprehensive and critical analysis and practice model for social work practice with and for people with disabilities than the traditional medical model, rehabilitative and social model approaches.

Keywords: anti-oppressive practice, disability, people with disabilities, social model of disability

Procedia PDF Downloads 1084
12275 Comparative Study of Electronic and Optical Properties of Ammonium and Potassium Dinitramide Salts through Ab-Initio Calculations

Authors: J. Prathap Kumar, G. Vaitheeswaran

Abstract:

The present study investigates the role of ammonium and potassium ion in the electronic, bonding and optical properties of dinitramide salts due to their stability and non-toxic nature. A detailed analysis of bonding between NH₄ and K with dinitramide, optical transitions from the valence band to the conduction band, absorption spectra, refractive indices, reflectivity, loss function are reported. These materials are well known as oxidizers in solid rocket propellants. In the present work, we use full potential linear augmented plane wave (FP-LAPW) method which is implemented in the Wien2k package within the framework of density functional theory. The standard DFT functional local density approximation (LDA) and generalized gradient approximation (GGA) always underestimate the band gap by 30-40% due to the lack of derivative discontinuities of the exchange-correlation potential with respect to an occupation number. In order to get reliable results, one must use hybrid functional (HSE-PBE), GW calculations and Tran-Blaha modified Becke-Johnson (TB-mBJ) potential. It is very well known that hybrid functionals GW calculations are very expensive, the later methods are computationally cheap. The new developed TB-mBJ functionals use information kinetic energy density along with the charge density employed in DFT. The TB-mBJ functionals cannot be used for total energy calculations but instead yield very much improved band gap. The obtained electronic band gap at gamma point for both the ammonium dinitramide and potassium dinitramide are found to be 2.78 eV and 3.014 eV with GGA functional, respectively. After the inclusion of TB-mBJ, the band gap improved by 4.162 eV for potassium dinitramide and 4.378 eV for ammonium dinitramide. The nature of the band gap is direct in ADN and indirect in KDN. The optical constants such as dielectric constant, absorption, and refractive indices, birefringence values are presented. Overall as there are no experimental studies we present the improved band gap with TB-mBJ functional following with optical properties.

Keywords: ammonium dinitramide, potassium dinitramide, DFT, propellants

Procedia PDF Downloads 157
12274 Examination of the Satisfaction Levels of Pre-Service Teachers Concerning E-Learning Process in Terms of Different Variables

Authors: Agah Tugrul Korucu

Abstract:

Significant changes have taken place for the better in the bulk of information and in the use of technology available in the field of education induced by technological changes in the 21st century. It is mainly the job of the teachers and pre-service teachers to integrate information and communication technologies into education by means of conveying the use of technology to individuals. While the pre-service teachers are conducting lessons by using technology, the methods they have developed are important factors for the requirements of the lesson and for the satisfaction levels of the students. The study of this study is to examine the satisfaction levels of pre-service teachers as regards e-learning in a technological environment in which there are lesson activities conducted through an online learning environment in terms of various variables. The study group of the research is composed of 156 pre-service teachers that were students in the departments of Computer and Teaching Technologies, Art Teaching and Pre-school Teaching in the academic year of 2014 - 2015. The qualitative research method was adopted for this study; the scanning model was employed in collecting the data. “The Satisfaction Scale regarding the E-learning Process”, developed by Gülbahar, and the personal information form, which was developed by the researcher, were used as means of collecting the data. Cronbach α reliability coefficient, which is the internal consistency coefficient of the scale, is 0.91. SPSS computerized statistical package program and the techniques of medium, standard deviation, percentage, correlation, t-test and variance analysis were used in the analysis of the data.

Keywords: online learning environment, integration of information technologies, e-learning, e-learning satisfaction, pre-service teachers

Procedia PDF Downloads 353
12273 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 96
12272 Extension and Closure of a Field for Engineering Purpose

Authors: Shouji Yujiro, Memei Dukovic, Mist Yakubu

Abstract:

Fields are important objects of study in algebra since they provide a useful generalization of many number systems, such as the rational numbers, real numbers, and complex numbers. In particular, the usual rules of associativity, commutativity and distributivity hold. Fields also appear in many other areas of mathematics; see the examples below. When abstract algebra was first being developed, the definition of a field usually did not include commutativity of multiplication, and what we today call a field would have been called either a commutative field or a rational domain. In contemporary usage, a field is always commutative. A structure which satisfies all the properties of a field except possibly for commutativity, is today called a division ring ordivision algebra or sometimes a skew field. Also non-commutative field is still widely used. In French, fields are called corps (literally, body), generally regardless of their commutativity. When necessary, a (commutative) field is called corps commutative and a skew field-corps gauche. The German word for body is Körper and this word is used to denote fields; hence the use of the blackboard bold to denote a field. The concept of fields was first (implicitly) used to prove that there is no general formula expressing in terms of radicals the roots of a polynomial with rational coefficients of degree 5 or higher. An extension of a field k is just a field K containing k as a subfield. One distinguishes between extensions having various qualities. For example, an extension K of a field k is called algebraic, if every element of K is a root of some polynomial with coefficients in k. Otherwise, the extension is called transcendental. The aim of Galois Theory is the study of algebraic extensions of a field. Given a field k, various kinds of closures of k may be introduced. For example, the algebraic closure, the separable closure, the cyclic closure et cetera. The idea is always the same: If P is a property of fields, then a P-closure of k is a field K containing k, having property, and which is minimal in the sense that no proper subfield of K that contains k has property P. For example if we take P (K) to be the property ‘every non-constant polynomial f in K[t] has a root in K’, then a P-closure of k is just an algebraic closure of k. In general, if P-closures exist for some property P and field k, they are all isomorphic. However, there is in general no preferable isomorphism between two closures.

Keywords: field theory, mechanic maths, supertech, rolltech

Procedia PDF Downloads 373
12271 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 220
12270 Internet as a Marketing Tool for Tourism Promotion

Authors: Emeka Okonkwo

Abstract:

The Information Technology (IT) has prevailed over all functions of strategic and operational management. The Internet (a product of information technology) has increasingly become a popular medium for marketing. This paper examines the potentials of Internet for tourism marketing. To achieve this, the paper x-rays the characteristics of tourism marketing and examines the application of the Internet in tourism marketing. It is argued that the use of Internet for tourism marketing will not only reach a broad audience and reduce the cost of transaction (by conventional methods used by travel agents in times past), but, will also alleviate the problems of identification, authentication and confirmation of travels/package tours by tourists as well as promotion of tourism industry.

Keywords: internet, marketing, tourism, tourism management

Procedia PDF Downloads 419
12269 Information Technology Impacts on the Supply Chain Performance: Case Study Approach

Authors: Kajal Zarei

Abstract:

Supply chain management is becoming an increasingly important issue in many businesses today. In such circumstances, a number of reasons such as management deficiency in different segments of the supply chain, lack of streamlined processes, resistance to change the current systems and technologies, and lack of advanced information system have paved the ground to ask for innovative research studies. To this end, information technology (IT) is becoming a major driver to overcome the supply chain limitations and deficiencies. The emergence of IT has provided an excellent opportunity for redefining the supply chain to be more effective and competitive. This paper has investigated the IT impact on two-digit industry codes in the International Standard Industrial Classification (ISIC) that are operating in four groups of the supply chains. Firstly, the primary fields of the supply chain were investigated, and then paired comparisons of different industry parts were accomplished. Using experts' ideas and Analytical Hierarchy Process (AHP), the status of industrial activities in Kurdistan Province in Iran was determined. The results revealed that manufacturing and inventory fields have been more important compared to other fields of the supply chain. In addition, IT has had greater impact on food and beverage industry, chemical industry, wood industry, wood products, and production of basic metals. The results indicated the need to IT awareness in supply chain management; in other words, IT applications needed to be developed for the identified industries.

Keywords: supply chain, information technology, analytical hierarchy process, two-digit codes, international standard industrial classification

Procedia PDF Downloads 281
12268 Using Machine Learning Techniques to Extract Useful Information from Dark Data

Authors: Nigar Hussain

Abstract:

It is a subset of big data. Dark data means those data in which we fail to use for future decisions. There are many issues in existing work, but some need powerful tools for utilizing dark data. It needs sufficient techniques to deal with dark data. That enables users to exploit their excellence, adaptability, speed, less time utilization, execution, and accessibility. Another issue is the way to utilize dark data to extract helpful information to settle on better choices. In this paper, we proposed upgrade strategies to remove the dark side from dark data. Using a supervised model and machine learning techniques, we utilized dark data and achieved an F1 score of 89.48%.

Keywords: big data, dark data, machine learning, heatmap, random forest

Procedia PDF Downloads 29
12267 Acculturation of Iranian Students in Europe

Authors: Shirin Sadat Ahmadi

Abstract:

The number of people, particularly university students, migrating from Iran and applying for American and European universities has been rising during recent years. Different people may have various reasons and goals for migration, but one of the common issues among all these people is the cultural challenges they experience when living in the adopted society. Immigrants usually confront obstacles during the Intercultural transition and adaption process. Different variables such as age, religion, gender, education, knowing the spoken language in destination country, financial condition, interactions with natives, and using social media can affect the cultural challenges people face after migration and how they conquer issues appearing due to intercultural differences and conflicts. In this research we have interviewed a sample consisted of 15 Iranian students living and studying abroad found by using snowball sampling technique via video call to realize what cultural challenges they have experienced in the new society, how the mentioned variables above eased these challenges or made them harder and what approaches and solutions they adopted to adjust themselves to the new society and its cultural dimensions. Based on John Berry's acculturation theory of migrant-host relationship, we have classified these 15 people in five different categories: Assimilation, Separation, Marginalization, and Integration. In addition we have considered Y.Y. Kim's communication-based theory of cross-cultural adaption to explain how communications helped migrant populations in adaption process. Based on the findings of this study, 12 of 15 interviewed members of the study used the integration strategy to adapt to the new cultural environment, 3 of them used the assimilation strategy, and none of them used marginalization or separation strategies. Communicating with natives, knowing the language, and education were the factors that helped all the interviewed members of the sample to overcome the difficulties of intercultural transition.

Keywords: acculturation, culture, intercultural transition, migration

Procedia PDF Downloads 63
12266 A Hard Day's Night: Persistent Within-Individual Effects of Job Demands and the Role of Recovery Processes

Authors: Helen Pluut, Remus Ilies, Nikos Dimotakis, Maral Darouei

Abstract:

This study aims to examine recovery from work as an important daily activity with implications for workplace behavior. Building on affective events theory and the stressor-detachment model as frameworks, this paper proposes and tests a comprehensive within-individual model that uncovers the role of recovery processes at home in linking workplace demands (e.g., workload) and stressors (e.g., workplace incivility) to next-day organizational citizenship behaviors (OCBs). Our sample consisted of 126 full-time employees in a large Midwestern University. For a period of 16 working days, these employees were asked to fill out 3 electronic surveys while at work. The first survey (sent out in the morning) measured self-reported sleep quality, recovery experiences the previous day at home, and momentary effect. The second survey (sent out close to the end of the workday) measured job demands and stressors as well as OCBs, while the third survey in the evening assessed job strain. Data were analyzed using Hierarchical Linear Modeling (HLM). Results indicated that job demands and stressors at work made it difficult to unwind properly at home and have a good night’s sleep, which had repercussions for next day’s morning effect, which, in turn, influenced OCBs. It can be concluded that processes of recovery are vital to an individual’s daily effective functioning and behavior at work, but recovery may become impaired after a hard day’s work. Thus, our study sheds light on the potentially persistent nature of strain experienced as a result of work and points to the importance of recovery processes to enable individuals to avoid such cross-day spillover. Our paper will discuss this implication for theory and practice as well as potential directions for future research.

Keywords: affect, job demands, organizational citizenship behavior, recovery, strain

Procedia PDF Downloads 139
12265 A Hybrid Digital Watermarking Scheme

Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif

Abstract:

Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.

Keywords: watermarking, image processing, DCT, LSB, PSNR

Procedia PDF Downloads 47
12264 Intellectual Capital and Transparency in Universities: An Empirical Study

Authors: Yolanda Ramirez, Angel Tejada, Agustin Baidez

Abstract:

This paper shows the general perceptions of Spanish university stakeholders in relation to the university’s annual reports and the adequacy and potential of intellectual capital reporting. To this end, a questionnaire was designed and sent to every member of the Social Councils of Spanish public universities. It was thought that these participants would provide a good example of the attitude of university stakeholders since they represent the different social groups connected with universities. From the results of this study we are in the position of confirming the need for universities to offer information on intellectual capital in their accounting information model.

Keywords: intellectual capital, disclosure, stakeholders, universities, annual report

Procedia PDF Downloads 500